Professional Documents
Culture Documents
MICROCONTROLLER
1
16th Sem TCE Gsssietw Mysore, 226th Sem TCE Gsssietw Mysore, 336th Sem TCE Gsssietw Mysore
Abstract- The main aim of the paper is to design and implement the Fingerprint based bank locker system using
microcontroller. Biometrics studies commonly include fingerprint, face, iris, voice, signature, and hand geometry recognition
and verification. Many other modalities are in various stages of development and assessment. Among these available biometric
traits finger Print proves to be one of the best traits providing good mismatch ratio and also reliable. The present scenario to
operate a bank locker is with locks which are having keys. This does not provide good security to our lockers. To provide
perfect security to the bank lockers and to make the work easier, this project is taking help of two different technologies viz.
EMBEDDED SYSTEMS and BIOMETRICS.
Index Terms- finger printing, signature identification, voice recognition, face recognition, iris scan, bank locker security,
identification number, digital code lock, biometrics.
I. INTRODUCTION
Security is of primary concern and in this busy,
competitive world, human cannot find ways to provide
security to his confidential belongings manually.
Instead, he finds an alternative which can provide a
full fledged security as well as atomized. In the
ubiquitous network society, where individuals can
easily access their information anytime and anywhere,
people are also faced with the risk that others can
easily access the same information anytime and
anywhere. Because of this risk, personal identification
technology, which can distinguish between registered
legitimate users and imposters, is now generating
interest.
Proceedings of IRF International Conference, 05th April-2014, Pondicherry, India, ISBN: 978-93-82702-71-9
155
1.3. BIOMETRICS
The term "Biometrics" is derived from the Greek
words bio (life) and metric (to measure).
Biometrics can be defined as recognizing and
identifying a person based on physiological or
behavioral characteristics. Biometrics is becoming an
interesting topic now in regards to computer and
network security. However the ideas of biometrics
have been around for many years.
Proceedings of IRF International Conference, 05th April-2014, Pondicherry, India, ISBN: 978-93-82702-71-9
156
Proceedings of IRF International Conference, 05th April-2014, Pondicherry, India, ISBN: 978-93-82702-71-9
157
Working
The block diagram consists of various blocks as shown
in Figure 2.1. When fingerprint module is interfaced to
the microcontroller, it will be in user mode. In this
mode, stored images will be verified with the scanned
images. When coming to our application the images of
the persons fingerprint that are authorized to open the
locker door will be stored in the module with a unique
id. To prove that the persons are authorized to open the
locker door they need to scan their fingerprint images.
2.2.CIRCUIT DIAGRAM
The circuit explanation includes the detailed pin
connections of every device with the microcontroller .
Power is available in the form of AC 230V, 50Hz but
microcontroller operates at 5V so, 7805 constant 5V,
1A positive voltage regulator which provides output of
5V is used. Crystal is connected to 18th and 19th pins
of microcontroller. The microcontroller 10th and 11th
pins are connected to 11th and 12th pins of MAX232
to initialize fingerprint module and to enable serial
communication. The fingerprint modules pins 2 and 3
are connected to DB9 connector which is inturn
connected to 13th and 14th pins of MAX232 through
the pins 2 and 3. LCD module consists of 8 data lines
D0 D7, out of which four pins are connected to port1
(P1).Additionally this module is having 3 control lines
namely RS, R/W and EN, where RS and EN are
connected to P1.0 and P1.1 respectively and R/W is
grounded. Keypad connections are given to Port0
entirely because it is a 4x4 matrix keypad. DC motor is
connected to microcontrollers P2.0 and P2.1 through
ULN2003 driver circuit.
2.3. FLOWCHART
The Flowchart is shown in the Figure 2.3. It shows
how the working of the project goes according to the
program. First when system is switched on, welcome
note will be displayed on LCD. User scans his finger,
if his/her finger does not match with stored database it
is indicated by the buzzer. If finger matches then two
options will be displayed on LCD like, first one is
open door option, and next is modify user option, if
user selects option 1 it asks for the 4 digit password if
Proceedings of IRF International Conference, 05th April-2014, Pondicherry, India, ISBN: 978-93-82702-71-9
158
III. RESULT
IV. ADVANTAGES
Figure 2.3.flowchart
1.
2.
3.
4.
5.
Proceedings of IRF International Conference, 05th April-2014, Pondicherry, India, ISBN: 978-93-82702-71-9
159
CONCLUSION
REFERENCES
[1]
[2]
[3]
[4]
[5]
Proceedings of IRF International Conference, 05th April-2014, Pondicherry, India, ISBN: 978-93-82702-71-9
160